Search This Blog

Friday, April 10, 2009

Conficker gets an update; China denies cyberattacks on U.S. power grid

How serious is threat to power grid?; Conficker cashes in, installs spam bots and scareware
Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Avaya
rule

Teleworking: Value for Virtual Workers
This white paper illustrates how teleworking is growing and transforming the way companies do business. It covers the business issues and benefits of implementing a Teleworker solution.

rule

Spotlight Story
Conficker, the Internet's No. 1 threat, gets an update

By Jeremy Kirk
Security researchers say a worm that has infected millions of computers worldwide has been reprogrammed to strengthen its defenses while also trying to attack more machines. Read full story

Related News:

China denies cyberattacks on U.S. power grid Malware attacks from China and Russia designed to shut down the U.S. electrical grid in a time of war did not occur, China said Thursday.

How serious is threat to power grid? Depends who you ask. Expert opinion differs widely over a report that the U.S. electric power-grid has been compromised by cyberspies, perhaps from Russia and China, who have installed malware so they can disrupt industrial control systems for electricity distribution in the event of a conflict.

Conficker cashes in, installs spam bots and scareware The makers of Conficker, the worm that has infected millions of PCs, have begun to do what all botnet owners do -- make money -- security researchers said Thursday as they started analyzing the malware's newest variant.

What I'll be looking for in cybersecurity report The big talk in Washington's cybersecurity world is Melissa Hathaway's magical 60-day review, which is supposed to recommend how U.S. government cybersecurity efforts should be pursued. The technical press and lobbyists are all abuzz over whether or not there will be a cybersecurity coordinator who reports to the president. In certain circles, this is even more gossiped about than what Michelle Obama is wearing, but frankly the discussion is even less useful.
Plus: Yet another government attempt at cybersecurity

Pentagon paid $100 million for six months of cyber defense Protecting defense department networks cost taxpayers more than $100 million over the past six months, U.S. Strategic Command officials said yesterday. "Pay me now or pay me later. "In the last six months, we spent more than $100 million reacting to things on our networks after the fact. It would be nice to spend that money proactively to put things in place so we'd be more active and proactive rather than cleaning up after the fact," one general said.

After attacks, Excel update due from Microsoft Corporate IT staffers will get a double whammy next week, as both Microsoft and Oracle are set to release critical security updates on the same day, including a likely fix for an Excel bug that has been used by cybercriminals.

A Lesson in Compliance from the Chemical Industry In many ways, the role of the CSO is directly tied to business profitability. By creating and enforcing policies that protect human, physical and intellectual assets, the CSO ensures the very integrity of the organization. This link to the bottom line, though, is about to become much stronger--and quite possibly much sooner than anticipated.

The state of spam 2009, Part 1 Spam - not SPAM the luncheon meat (and you have GOT to visit the official SPAM Web site, which plays like a parody the Monty Python crew might have dreamed up) - is a dreadful nuisance, with estimates that 95% of all e-mail in the world now consists of rubbish. Periodically I look into the state of the spam to see how the war is going.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


App to no good
10 iPhone apps that could get you into troubleA look at the top 10 iPhone apps that could get you into trouble.

CEO payday breakdown
CEO payday: How much tech chiefs made in '08A detailed account of how much tech chiefs made in 2008.

Sponsored by Avaya
rule

Teleworking: Value for Virtual Workers
This white paper illustrates how teleworking is growing and transforming the way companies do business. It covers the business issues and benefits of implementing a Teleworker solution.

rule

Accurately Troubleshoot your Apps
Optimize your application troubleshooting efforts with the best practices described in this whitepaper, "Application Troubleshooting Guide." Eliminate finger pointing between departments. Find out how to isolate the source of application performance problems and what to look for when troubleshooting. Get all of the details today.
Download this whitepaper now.


Everybody says "Do more with less!"
But no one tells you how. We will and it costs nothing to find out at IT Roadmap Conference and Expo. Coming to 10 cities in 09 including New York in February, Denver in March, Chicago in April.
Register now, attend free

 

04/10/09

Today's most-read stories:

  1. Report: Nokia Siemens bids for much of Nortel
  2. 10 eye-catching gadgets at CTIA
  3. Internet-wide problem to be revealed at conference
  4. Cyberspies have compromised U.S. power grid
  5. FBI claims ISP stole millions from AT&T, Verizon
  6. Researcher's death casts pall over major TCP fix
  7. Nortel expands its NAC offerings
  8. Sun made colossal mistake in turning down IBM offer
  9. Pentagon cyber defense bill: $100 million in six months
  10. Conficker, the Internet's No.1 threat, gets an update
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: